libtiff.so is susceptible to denial of service (DoS) attack. The attack is possible when an attacker send a malicious TIFF file to the cpSeparateBufToContigBuf
function in tiffcp.c
to cause a heap-based buffer overflow.
CPE | Name | Operator | Version |
---|---|---|---|
libtiff.so | le | 5.2.0 | |
libtiff | eq | 4.0.9__13.el8 | |
libtiff | le | 4.0.6.2 |
bugzilla.maptools.org/show_bug.cgi?id=2798
access.redhat.com/errata/RHSA-2019:2053
access.redhat.com/errata/RHSA-2019:3419
github.com/Hack-Me/Pocs_for_Multi_Versions/tree/main/CVE-2018-12900
lists.debian.org/debian-lts-announce/2019/11/msg00027.html
usn.ubuntu.com/3906-1/
usn.ubuntu.com/3906-2/
www.debian.org/security/2020/dsa-4670